JMS Rss Feed Security & Risk Analysis

wordpress.org/plugins/jms-rss-feed

Add the featured image tag in your posts RSS feed. For standard RSS feed XML, there is no image tag definition. This plugin will show the post featur …

20 active installs v3.5.0 PHP + WP 4.0.0+ Updated Mar 29, 2018
add-featured-imageadd-featured-image-to-rssfeatured-imagefeedpost-thumbnail
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is JMS Rss Feed Safe to Use in 2026?

Generally Safe

Score 85/100

JMS Rss Feed has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "jms-rss-feed" plugin v3.5.0 demonstrates a generally strong security posture based on the provided static analysis. The absence of identified AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface. Furthermore, the absence of dangerous functions, raw SQL queries, file operations, and external HTTP requests is commendable. The plugin also shows no history of known vulnerabilities, which is a positive indicator of its development and maintenance practices.

However, a critical concern arises from the output escaping analysis, where 100% of identified outputs are not properly escaped. This presents a significant risk of Cross-Site Scripting (XSS) vulnerabilities, as user-supplied data or data fetched from external sources could be injected and executed within the user's browser. While other areas show strength, this lack of output sanitization is a major weakness that could be exploited even with a limited attack surface.

In conclusion, the "jms-rss-feed" plugin has a commendable foundation of secure coding practices, particularly in its limited attack surface and avoidance of common vulnerabilities. Nevertheless, the complete lack of output escaping introduces a substantial risk of XSS. This single deficiency overshadows the otherwise positive analysis and requires immediate attention.

Key Concerns

  • 100% of outputs not properly escaped
Vulnerabilities
None known

JMS Rss Feed Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

JMS Rss Feed Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

JMS Rss Feed Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionrss2_itemjms-rss-feed.php:28
Maintenance & Trust

JMS Rss Feed Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.0
Last updatedMar 29, 2018
PHP min version
Downloads2K

Community Trust

Rating20/100
Number of ratings1
Active installs20
Developer Profile

JMS Rss Feed Developer Profile

James

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect JMS Rss Feed

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<jms-featured-image>
FAQ

Frequently Asked Questions about JMS Rss Feed